2021 4th International Conference of Computer and Informatics Engineering (IC2IE) 2021
DOI: 10.1109/ic2ie53219.2021.9649020
|View full text |Cite
|
Sign up to set email alerts
|

Message Digest 5 (MD-5) Decryption Application using Python-Based Dictionary Attack Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…almost all operating systems are supported by the Python language, even for the Linux operating system, almost all distributions include Python in it. With a code that is simple and easy to implement, a programmer can prioritize the development of the application he is making, instead of being busy looking for syntax errors [19] [20].…”
Section: Methodsmentioning
confidence: 99%
“…almost all operating systems are supported by the Python language, even for the Linux operating system, almost all distributions include Python in it. With a code that is simple and easy to implement, a programmer can prioritize the development of the application he is making, instead of being busy looking for syntax errors [19] [20].…”
Section: Methodsmentioning
confidence: 99%
“…The STG Simulation APP structure is shown in Figure 4 The data model is divided into a user information model and a simulation information model. The user information model is used to store basic user information such as user name, password, user role and the permission to use the simulation model, where the password is stored with salted MD5 encryption to prevent dictionary attacks [8]. The simulation information model stores basic parameters such as title, description, simulation model, simulation input and output parameters and supercomputing platform operation parameters.…”
Section: The Stg Simulation App Buildmentioning
confidence: 99%
“…These studies obtained different objectives such as response time, tardiness, and network delay. An integrated particle swarm optimization-enabled scheme was presented by [ 3 , 4 , 15 , 17 ], where a message digest (MD5) scheme was integrated with a particle swarm optimization (PSO) algorithm to secure healthcare tasks in the IoT network. The goal was to minimize security risks in the network, and these studies considered fine-grained tasks and homogeneous networks in their models.…”
Section: Related Workmentioning
confidence: 99%
“…The main goal was to reduce local and global search times for scheduling on heterogeneous fog and cloud nodes in the system, establish a secure environment among connected nodes, and minimize attack risk in the IoT network. These dynamic approaches can identify anomalies and resource performance of applications, but there was still uncertainly of heterogeneous nodes in terms of scalability [ 17 , 18 , 19 , 20 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation